GB/T 36624-2018 PDF English
US$350.00 · In stock · Download in 9 secondsGB/T 36624-2018: Information technology -- Security techniques -- Authenticated encryption Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
| GB/T 36624-2018 | English | 350 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Information technology -- Security techniques -- Authenticated encryption
| Valid |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GB/T 36624-2018
GB/T 36624-2018: Information technology -- Security techniques -- Authenticated encryption---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT36624-2018
GB
NATIONAL STANDARD OF THE
PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
L 80
Information Technology - Security Techniques -
Authenticated Encryption
(ISO/IEC 19772.2009, MOD)
Issued on. SEPTEMBER 17, 2018
Implemented on. APRIL 1, 2019
Issued by. State Administration for Market Regulation;
Standardization Administration of the People’s Republic of
China.
Table of Contents
Foreword... 3
1 Scope... 5
2 Normative References... 5
3 Terms and Definitions... 6
4 Symbols... 7
5 Overview... 8
6 Authenticated Encryption Mechanism 1... 9
7 Authenticated Encryption Mechanism 2... 11
8 Authenticated Encryption Mechanism 3... 15
9 Authenticated Encryption Mechanism 4... 17
10 Authenticated Encryption Mechanism 5... 19
Appendix A (normative) ASN.1 Module... 24
Appendix B (informative) Application Instructions for Authenticated Encryption
Mechanisms... 25
Appendix C (informative) Data Examples... 29
Bibliography... 33
Foreword
This Standard was drafted in accordance with the rules in GB/T 1.1-2009.
This Standard adopts the re-drafting law to modify the adoption of ISO/IEC 19772.2009
Information Technology - Security Techniques - Authenticated Encryption.
In comparison with ISO/IEC 19772.2009, the technical differences and the causes for
these differences are as follows.
---In regard to normative references, this Standard makes adjustments with
technical differences, so as to adapt to the technical conditions of China. The
adjustments are concentratedly reflected in Chapter 2 “Normative References”.
The specific adjustments are as follows.
GB/T 15852.1-2008, which equivalently adopts the international standard,
is used to replace ISO/IEC 9797-1 (see 8.4);
GB/T 17964-2008 is used to replace ISO/IEC 10116 (see 9.3);
GB/T 32907-2016 is used to replace ISO/IEC 18033-3 (see Chapter 5);
GB/T 25069-2010 is added to the references (see Chapter 3);
---In Chapter 3, terms and definitions that have already been defined in the current
national standards are directly adopted; some common definitions are deleted.
In comparison with ISO/IEC 19772.2009, there are relatively significant adjustments in
structure. See the details below.
---The content of Scope in ISO/IEC 19772.2009 is modified; some content is
transferred to Chapter 5 Overview;
---In consideration of the practical application scope of China’s national conditions
technology, this Standard adopts the five authenticated encryption mechanisms
specified in Chapter 7 ~ Chapter 11 in ISO/IEC 19772.2009; deletes the
authenticated encryption mechanism specified in Chapter 6 in ISO/IEC
19772.2009;
---Normative Appendix C in ISO/IEC 19772.2009 is adjusted to Appendix A,
correspondingly, Informative Appendix A and Appendix B in ISO/IEC
19772.2009 are respectively adjusted to Appendix B and Appendix C;
---The data example provided in Appendix C is modified to use SM4 algorithm as
an example.
This Standard makes the following editorial modification.
---The content of the corrected version of ISO/IEC 19772.2009 is included.
Please be noted that certain content of this document might involve patents. The
institution issuing this document does not undertake the responsibility of identifying
these patents.
This Standard was proposed by and shall be under the jurisdiction of National
Technical Committee 260 on Information Technology Security of Standardization
Administration of China (SAC/TC 260).
The drafting organizations of this Standard. Data Assurance & Communications
Security Center; Institute of Software Chinese Academy of Sciences; Beijing JN TASS
Technology Co., Ltd.
The main drafters of this Standard. Wang Qiongxiao, Cai Quanwei, Zhang Yingjun,
Zhao Yuhang, Song Li, Wu Pengyi, Wennan, Lin Jingqiang, Jing Jiwu, Wang Mingyue,
Song Tianlin.
Information Technology - Security Techniques -
Authenticated Encryption
1 Scope
This Standard specifies five authenticated encryption mechanisms, which achieve the
following security objectives by defining the methods of processing a data string.
2 Normative References
The following documents are indispensable to the application of this document. In
terms of references with a specified date, only versions with a specified date are
applicable to this document. In terms of references without a specified date, the latest
version (including all the modifications) is applicable to this document.
GB/T 15852.1-2008 Information Technology - Security Techniques - Message
Authentication Codes (MACs) - Part 1.Mechanisms Using a Block Cipher (ISO/IEC
9797-1.1999, IDT)
3 Terms and Definitions
What is defined in GB/T 15852.1-2008, GB/T 17964-2008 and GB/T 25069-2010, and
the following terms and definitions are applicable to this document.
4 Symbols
The following symbols are applicable to this document.
5 Overview
The five authenticated encryption mechanisms specified in this Standard are all based
on the block cipher algorithm. Meanwhile, the data originator and data recipient are
required to share keys.
6 Authenticated Encryption Mechanism 1
The block cipher algorithm used in this mechanism shall be a 128-bit block cipher
algorithm, namely, n = 128.This mechanism requires that the protected data D shall
at least contain 128 bits, and the data length shall be an integer multiple of 64 bits
[namely, len(D) = 64m, m > 1].
7 Authenticated Encryption Mechanism 2
Before using this authenticated encryption mechanism, the data originator and data
recipient shall firstly negotiate and determine the following matters.
8 Authenticated Encryption Mechanism 3
Before using this authenticated encryption mechanism, the data originator and
recipient shall firstly determine the standard length t, in which, 0 < t ≤ n.
The recipient shall execute the following steps to decrypt and verify the authenticated
encrypted data C.
9 Authenticated Encryption Mechanism 4
Before using this authenticated encryption mechanism, the data originator and data
recipient shall firstly negotiate and determine the following matters.
10 Authenticated Encryption Mechanism 5
Before using this authenticated encryption mechanism, the data originator and
recipient shall firstly negotiate and determine the tag length t. The value of t shall be
an integer multiple of 8 and satisfy 96 ≤ t ≤ 128 (under specific circumstances, the
value of t may also be 32 or 64).
Appendix A
(normative)
ASN.1 Module
The five authenticated encryption mechanisms specified in this Standard are
respectively corresponding to ae-mechanism2, ae-mechanism3, ae-mechanism4, ae-
mechanism5 and ae-mechanism6 in the above ASN.1 definition.
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GB/T 36624-2018 be delivered?Answer: The full copy PDF of English version of GB/T 36624-2018 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GB/T 36624-2018_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 36624-2018_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GB/T 36624-2018 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.
How to buy and download a true PDF of English version of GB/T 36624-2018?A step-by-step guide to download PDF of GB/T 36624-2018_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GB/T 36624-2018". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|